Spelling suggestions: "subject:" 2security"" "subject:" bsecurity""
581 |
FPGA-Augmented Secure Crash-Consistent Non-Volatile MemoryZou, Yu 01 January 2021 (has links) (PDF)
Emerging byte-addressable Non-Volatile Memory (NVM) technology, although promising superior memory density and ultra-low energy consumption, poses unique challenges to achieving persistent data privacy and computing security, both of which are critically important to the embedded and IoT applications. Specifically, to successfully restore NVMs to their working states after unexpected system crashes or power failure, maintaining and recovering all the necessary security-related metadata can severely increase memory traffic, degrade runtime performance, exacerbate write endurance problem, and demand costly hardware changes to off-the-shelf processors. In this thesis, we summarize and expand upon two of our innovative works, ARES and HERMES, to design a new FPGA-assisted processor-transparent security mechanism aiming at efficiently and effectively achieving all three aspects of a security triad—confidentiality, integrity, and recoverability—in modern embedded computing. Given the growing prominence of CPU-FPGA heterogeneous computing architectures, ARES leverages FPGA's hardware reconfigurability to offload performance-critical and security-related functions to the programmable hardware without microprocessors' involvement. In particular, recognizing that the traditional Merkle tree caching scheme cannot fully exploit FPGA's parallelism due to its sequential and recursive function calls, ARES proposed a new Merkle tree cache architecture and a novel Merkle tree scheme which flattened and reorganized the computation in the traditional Merkle tree verification and update processes to fully exploit the parallel cache ports and to fully pipeline time-consuming hashing operations. To further optimize the throughput of BMT operations, HERMES proposed an optimally efficient dataflow architecture by processing multiple outstanding counter requests simultaneously. Specifically, HERMES explored and addressed three technical challenges when exploiting task-level parallelism of BMT and proposed a speculative execution approach with both low latency and high throughput.
|
582 |
High Performance and Secure Execution Environments for Emerging ArchitecturesAlwadi, Mazen 01 January 2020 (has links) (PDF)
Energy-efficiency and performance have been the driving forces of system architectures and designers in the last century. Given the diversity of workloads and the significant performance and power improvements when running workloads on customized processing elements, system vendors are drifting towards new system architectures (e.g., FAM or HMM). Such architectures are being developed with the purpose of improving the system's performance, allow easier data sharing, and reduce the overall power consumption. Additionally, current computing systems suffer from a very wide attack surface, mainly due to the fact that such systems comprise of tens to hundreds of sub-systems that could be manufactured by different vendors. Vulnerabilities, backdoors, and potentially hardware trojans injected anywhere in the system form a serious risk for confidentiality and integrity of data in computing systems. Thus, adding security features is becoming an essential requirement in modern systems. In the purpose of achieving these performance improvements and power consumption reduction, the emerging NVMs stand as a very appealing option to be the main memory building block or a part of it. However, integrating the NVMs in the memory system can lead to several challenges. First, if the NVM is used as the sole memory, incorporating security measures can exacerbate the NVM's write endurance and reduce its lifetime. Second, integrating the NVM as a part of the main memory as in DRAM-NVM hybrid memory systems can lead to higher performance overheads of persistent applications. Third, Integrating the NVM as a memory extension as in fabric-attached memory architecture can cause a high contention over the security metadata cache. Additionally, in FAM architectures, the memory sharing can lead to security metadata coherence problems. In this dissertation, we study these problems and propose novel solutions to enable secure and efficient integration of NVMs in the emerging architectures.
|
583 |
Cute Panda or Evil Dragon? Market Economy, Conflict Behavior and China's Peaceful RiseCao, Xiongwei 01 January 2020 (has links) (PDF)
China has two contrasting images in the West: a cute panda and an evil dragon. In recent years, a near-consensus seems to be forming among policy makers in Washington that the People's Republic of China (PRC) is more of an evil dragon than a cute panda, using "sharp power" to threaten U.S. interests and world peace. The PRC is regarded by the current U.S. administration as a "strategic competitor," and a new Cold War seems to be looming between the world's two largest economies. Is the rise of China destined to cause conflicts or even war? After analyzing the conflict behavior of the PRC documented in the Correlates of War project's Militarized Interstate Dispute dataset (v4.3), this research shows that China's rise does not seem to make conflict more likely. Instead, with the growth of its power, Beijing has become increasingly reluctant to use force against other states. Drawing on the economic norms theory, the author argues that the development of the capitalist-market economy since late 1970s has fundamentally changed China's economic conditions, social norms and political culture. This transformation has helped the PRC form increasing interests in maintaining a robust global marketplace and a peaceful world order, thus making war or serious conflicts with other nations almost unimaginable. Currently, China is more a panda rather than a dragon. However, the West needs to remember that though vegetarian and non-predatory, pandas are bears with sharp teeth and nails. When pressured and cornered, they can be dangerous. The misunderstanding and fear of China, rather than the rise of China itself, is the real cause of the recent rise of US-China frictions.
|
584 |
Improving Foreign Militaries -- The Effects of U.S. Military Aid in the Form of International Military Education and Training ProgramsFabian, Sandor 01 January 2020 (has links) (PDF)
Great powers have often sought to achieve their strategic goals through the allocation of military aid. The United States is no exception, as it has frequently used military aid to influence the policies and military capacity of its allies and partners. However, our understanding of the effects of US military aid on the conflict behavior of recipient states - and especially the mechanisms underlying these effects - remains poorly understood. The results of previous studies of U.S. military aid are often contradictory, and are mostly based on over-aggregated, country-level data. In this dissertation, I argue that examining the individual-level effects will give us a better understanding of the mechanisms underlying country-level associations between US military aid and recipient behavior. I examine three research questions related to the manner in which military aid influences conflict in recipient countries. First, I explore the individual effects of U.S. IMET using semi-structures in-depth interviews and an original survey of Hungarian military officers and non-commissioned officers. This paper investigates the transmission of professional values and "democratic" norms to individual participants through the U.S. IMET programs. Second, I investigate the effects of U.S. IMET participation on civil conflict duration. I argue that government forces with more robust U.S. IMET participation will accumulate more and better military human capital, which incentivize rebels to hide and minimize their operations leading to a prolonged civil conflict. Finally, while exploring recipient states international conflict behavior I theorize that American educated and trained foreign military personnel return home with a better understanding about the role of the military as an instrument of national power, civil-military relations, the value of cooperation and the cost of war. I argue that these military personnel advise their political masters against the use of military force during international disputes leading to a decreased probability of MID initiation. I find support for each of the main arguments presented in the dissertation. Overall, this dissertation represents one of the first attempts to move beyond country-level data and explore the micro-foundations of US military assistance.
|
585 |
Group Level Cues and The Use of Force in Domestic and Foreign Policy ContextsMitkov, Zlatin 01 January 2021 (has links) (PDF)
To what extent do elite and social group cues affect the public's willingness to embrace their leader's actions during domestic and international security crises? Studies traditionally have focused on top-down elite cue-driven models to study how the public's attitudes are influenced during international and domestic security crises, largely disregarding the bottom-up effects social peer groups can have on individuals' attitudes. This is problematic as the public is regularly exposed to cue messages from elites and social peer groups, both of which are expected to help determine how successful leaders will be in mobilizing public support on a tactical level. To address this dissertation, conducted three studies drawing on prospect theory and audience costs evaluating to what extend elite and social group cues are able to moderate the American and Indian public's willingness to support or oppose the use of force in the context of humanitarian interventions, trade disputes, international and domestic security crises. Relying on ten survey experiments, the results from the three studies present robust evidence that the tactical use of elite and social group cues is not particularly effective as these information signals are unable to consistently induce preference shifts among the public during domestic and international security crises.
|
586 |
Understanding the Security of Emerging Systems: Analysis, Vulnerability Management, and Case StudiesAnwar, Afsah 01 January 2021 (has links) (PDF)
The Internet of Things (IoT) integrates a wide range of devices into a network to provide intelligent services. The lack of security mechanisms in such systems can cause an exposure of sensitive private data. Moreover, a networks of compromised IoT devices can allow adversaries the ability to bring down crucial systems. Indeed, adversaries have exploited software vulnerabilities in these devices for their benefit, and to execute various malicious intents. Therefore, understanding the software of these emerging systems is of the utmost importance. Building towards this goal, in this dissertation, we undertake a comprehensive analysis of the IoT software by employing different analysis techniques. To analyze the emerging IoT software systems, we first perform an in-depth and thorough analysis of the IoT binaries through static analysis. Through efficient and scalable static analysis, we extract artifacts that highlight the dynamics of the malware. In particular, by analyzing the strings, functions, and Control Flow Graphs (CFGs) of the IoT malware, we uncover their execution strategy, unique textual characteristics, and network dependencies. Additionally, through analysis of CFGs, we show the ability to approximate the main function. Using the extracted static artifacts, we design an effective malware detector. Noting that IoT malware have increased their sophistication and impact, the static approaches are prone to obfuscation that aims to evade analysis attempts. Acknowledging these attempts and to mitigate such threats, it is essential to profile the shared and exclusive behavior of these threats, such that they are easily achievable and aware of the capabilities of the widely-used IoT devices. To that end, we introduce MALInformer, an integrated dynamic and static analysis framework to analyze Linux-based IoT software and identify behavioral patterns for effective threat profiling. Leveraging an iterative signatures selection method, by taking into account the normalized frequency, cardinality, and programs covered by the signatures, MALInformer identifies distinctive and interpretable behaviors for every threat category. The static and dynamic analyses show the exploitability of the emerging systems. These weaknesses are typically reported to vulnerability databases along with the information that enable their reproduction and subsequent patching in other and related software. These weaknesses are assigned a Common Vulnerabilities and Exposures (CVE) number. We explore the quality of the reports in the National Vulnerability Database (NVD), unveiling their inconsistencies which we eventually fix. We then conduct case studies, including a large-scale evaluation of the cost of software vulnerabilities, revealing that the consumer product, software, and the finance industry are more likely to be negatively impacted by vulnerabilities. Overall, our work builds tools to analyze and detect the IoT malware and extract behavior unique to malware families. Additionally, our consistent NVD streamlines vulnerability management in emerging internet-connected systems, highlighting the economics aspects of vulnerabilities.
|
587 |
Security Dynamics in West Africa: The Interplay of Ecology, State Legitimacy, and Corruption on State StabilityBanini, Daniel 01 January 2021 (has links) (PDF)
West Africa's dominant sources of security threats have shifted in the past 20 years from large-scale civil wars to low-intensity conflicts previously unaccentuated. This dissertation takes on three of these new security threats; a) crop farmer (farmer) and animal herder (herder) tensions, b) small arms proliferation, and c) corruption and security. The clashes between farmers and herders have assumed significant security dimensions in the past decade, yet, we have a limited understanding of the conflict processes. I examined farmer-herder contestations in chapter two from climate-change conflict nexus and common-pool resource (CPR) governance perspectives. First, I argue that the recent farmer-herder skirmishes are evidence of climate volatility, positing that extreme climatic factors have contributed to these clashes' frequency and severity. Second, I assess how local CPR regimes in the conflict hotspots exacerbate the tension by considering these resources' social embeddedness and the implications of different user stratifications. The analysis draws on detailed interview data gathered in the conflict hotspots in the Kwahu enclave in the Eastern Region of Ghana in 2020 to explain the mechanisms. The climate-conflict literature has developed an affinity for large-N approaches, with few studies emphasizing qualitative methods. Qualitative approaches can emphasize location-specific conditions of the conflict dynamics to illustrate variations at the micro-level. For which no quantitative data exist, for instance, power relations between groups or CPR design principles to cope with the exigencies of climate extremes and intergroup tensions, fieldworks or interview approaches can provide better contextualization. They can pinpoint the broader causal dynamics critical for understanding climate–conflict links but are easily ignored by methods focusing on the narrow relationships between mainly two variables. The study reveals that a) seasonal variability affects farmer-herder conflicts, with the intensity (frequency and fatality) peaking during the heart of the drought period and b) ambiguous CPR governance regimes and weak land rights also feature prominently as the conflict driver. The third chapter investigates how state legitimacy influences the demand for small arms and light weapons (SALW) and how this, in effect, provokes conflicts in the West African subregion. Specifically, I evaluate the Economic Community of West African States' (ECOWAS) nonproliferation regime on small arms. I argue that the state's legitimacy is the mechanism that determines if it will import arms outside the legal routes and if conflict will follow. The analysis uses qualitative evidence of SALW proliferation data with a state legitimacy index to explain the tendency to comply with the collective security agreement. The second part uses case studies about Ghana, Côte d'Ivoire (CD1), and Nigeria to draw further inferences on how state legitimacy crises induce small arms demands and undermine compliance with the nonproliferation agreement. The findings reveal that state legitimacy bodes well for not acquiring arms outside the legal channels. The evidence also suggests that state capacity, an essential mechanism in treaty compliance, has little impact on states' ability to implement the regime. State capacity plays a marginal role because countries with domestic legitimacy problems acquired arms with little adherence to the security regime because of 'insecurity and the constant need to be on high alert. This makes state capacity a secondary factor as countries decide not to enforce the regime rules because of domestic legitimacy problems. In Ghana, state legitimacy pointed in the direction of compliance, while in CDI and Nigeria, diminished state legitimacy led to conflict, reducing the ability to implement the regime. Chapter four explores links between political corruption, and national security, using Boko Haram in Nigeria as a case study. I argue that corruption is a security problem because it diverts resources away from national security issues, predisposes resource distribution to patronage networks that co-opt state institutions, and distorts counterinsurgency success. The empirical analysis, drawn from micro-qualitative evidence from financial statements, military records, and terrorism data, finds that corruption enervated military capacity while strengthening insurgency effectiveness. This study makes links between corruption and insurgency in a novel way and expands our grasp of what makes counterinsurgency successful. Chapter five summarizes the general findings and reveals how the project contributes to our understanding of security dynamics in the West African subregion. Overall, the evidence illustrates that it is difficult to provide security without some fundamental government legitimacy, governance effectiveness, and more importantly, without considering how ecological scarcity, which has become more pronounced recently, threatens security nationally and at the micro-levels.
|
588 |
Military Political Influence: How Military Leaders Interact with the Public Political SpaceSpolizino, Thomas 01 January 2021 (has links) (PDF)
Recent tensions in US civil-military relations point to a potential sea-change in the way US military officers interact with the public political space. This study considers that relationship with three linked papers. It considers the partisanship of officers, using a novel survey of 471 US Army officers and cadets to determine the political inclinations and activity of that group as well as to assess the willingness of officers to use force internationally. It uses a separate, nationally representative, survey experiment to weigh the influence of military conditions on public opinion regarding the use of force in international crises. The study finds that officers are, in fact, highly influential in US politics, but remain unlikely to use that influence. It finds that officers remain true to their professional ethics both externally by refraining from political action and internally by developing politically moderate views. It also finds that service as an officer has a moderating effect on an individual's willingness to use force, so that initial selection effects which make the officer population initially more hawkish are moderated over time. It finally reinforces the potential political impact of officers by showing that the conditions they establish internationally have a significant impact on the way the public views the use of force during international crises. Through these three findings, this work makes a contribution to the civil-military relations sub-field, specifically that work considering the civil-military relations gap and provides confidence in the military institution.
|
589 |
Exploring the Privacy Dimension of Wearables Through Machine Learning-Enabled InferenceMeteriz Yildiran, Ulku 01 January 2022 (has links) (PDF)
Today's hyper-connected consumers demand convenient ways to tune into information without switching between devices, which led the industry leaders to the wearables. Wearables such as smartwatches, fitness trackers, and augmented reality (AR) glasses can be comfortably worn on the body. In addition, they offer limitless features, including activity tracking, authentication, navigation, and entertainment. Wearables that provide digestible information stimulate even higher consumer demand. However, to keep up with the ever-growing user expectations, developers keep adding new features and interaction methods to augment the use cases without considering their privacy impacts. In this dissertation, we explore the privacy dimension of wearables through inference attacks facilitated by machine learning approaches. We start our investigation by exploring the attack surface introduced by fitness trackers. We propose an inference attack that breaches location privacy through the elevation profiles collected by fitness trackers. Our attack highlights that adversaries can infer the location from elevation profiles collected via fitness trackers. Second, we investigated the attack surface introduced by the smartwatches. We introduce an inference attack that exploits the smartwatch microphone to capture the acoustic emanations of physical keyboards and successfully infers what the user has been typing. With this attack, we showed that smartwatches add yet another privacy dimension to be considered. Third, we examined the privacy of AR domain. We designed an inference attack exploiting the geometric projection of hand movements in air. The attack framework predicts the typed text on an in-air tapping keyboard, which is only visible to the user. Our studies uncover various attack surfaces introduced by wearables that have not been studied in literature before. For each attack, we propose possible countermeasures to diminish the ramifications of the risks. We hope that our findings shed light to the privacy risks of wearables and guide the research community to more aware solutions.
|
590 |
Human Security in MaliGreene, Owen J. 10 1900 (has links)
Yes / The context in Mali has changed considerably in the last few years. Progress on poverty eradication, growth and democratization was stalled as conflict erupted in 2012 but resumed in 2013 and is now slowly getting back on track. A preliminary agreement was signed in 2013 setting the frame for peace talks that are still on-going with Algeria as chief mediator. In spite of these negotiations, violent clashes and attacks by armed groups continue in the northern regions of the country. The post-conflict setting in Mali has created new challenges for the Swedish development cooperation portfolio.
|
Page generated in 0.0594 seconds